Intrusion Cash on Hand 2010-2024 | INTZ
Intrusion cash on hand from 2010 to 2024. Cash on hand can be defined as cash deposits at financial institutions that can immediately be withdrawn at any time, and investments maturing in one year or less that are highly liquid and therefore regarded as cash equivalents and reported with or near cash line items.
Intrusion Annual Cash on Hand (Millions of US $) |
2023 |
$0 |
2022 |
$3 |
2021 |
$4 |
2020 |
$17 |
2019 |
$3 |
2018 |
$2 |
2017 |
$0 |
2016 |
$0 |
2015 |
$0 |
2014 |
$1 |
2013 |
$1 |
2012 |
$0 |
2011 |
$0 |
2010 |
$1 |
2009 |
$1 |
Intrusion Quarterly Cash on Hand (Millions of US $) |
2024-06-30 |
$2 |
2024-03-31 |
$0 |
2023-12-31 |
$0 |
2023-09-30 |
$0 |
2023-06-30 |
$0 |
2023-03-31 |
$0 |
2022-12-31 |
$3 |
2022-09-30 |
$7 |
2022-06-30 |
$7 |
2022-03-31 |
$6 |
2021-12-31 |
$4 |
2021-09-30 |
$7 |
2021-06-30 |
$9 |
2021-03-31 |
$13 |
2020-12-31 |
$17 |
2020-09-30 |
$2 |
2020-06-30 |
$3 |
2020-03-31 |
$3 |
2019-12-31 |
$3 |
2019-09-30 |
$2 |
2019-06-30 |
$1 |
2019-03-31 |
$1 |
2018-12-31 |
$2 |
2018-09-30 |
$1 |
2018-06-30 |
$0 |
2018-03-31 |
$0 |
2017-12-31 |
$0 |
2017-09-30 |
$0 |
2017-06-30 |
$0 |
2017-03-31 |
$0 |
2016-12-31 |
$0 |
2016-09-30 |
$0 |
2016-06-30 |
$1 |
2016-03-31 |
$0 |
2015-12-31 |
$0 |
2015-09-30 |
$1 |
2015-06-30 |
$1 |
2015-03-31 |
$1 |
2014-12-31 |
$1 |
2014-09-30 |
$1 |
2014-06-30 |
$0 |
2014-03-31 |
$0 |
2013-12-31 |
$1 |
2013-09-30 |
$0 |
2013-06-30 |
$1 |
2013-03-31 |
$0 |
2012-12-31 |
$0 |
2012-09-30 |
$0 |
2012-06-30 |
$0 |
2012-03-31 |
$0 |
2011-12-31 |
$0 |
2011-09-30 |
$0 |
2011-06-30 |
$0 |
2011-03-31 |
$0 |
2010-12-31 |
$1 |
2010-09-30 |
$0 |
2010-06-30 |
$0 |
2010-03-31 |
$0 |
2009-12-31 |
$1 |
2009-09-30 |
$0 |
2009-06-30 |
$0 |
2009-03-31 |
$0 |
Sector |
Industry |
Market Cap |
Revenue |
Computer and Technology |
Computer Networks |
$0.005B |
$0.006B |
Intrusion Inc. is a leading global provider of enterprise security solutions for the information-driven economy. Intrusion Inc.'s suite of security products help businesses protect critical information assets by quickly detecting, analyzing and responding to network- and host-based attacks.
|